Advances in Information and Computer Security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings /

The Fifth International Workshop on Security (IWSEC 2010) was held at Kobe InternationalConferenceCenter,Kobe,Japan,November22–24,2010. Thewo- shop was co-organized by CSEC, a special interest group concerned with the computer security of the Information Processing Society of Japan (IPSJ) and ISEC,a...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Echizen, Isao (Επιμελητής έκδοσης), Kunihiro, Noboru (Επιμελητής έκδοσης), Sasaki, Ryoichi (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6434
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talks
  • Automating Security Configuration and Administration: An Access Control Perspective
  • Security Metrics and Security Investment Models
  • Encryption
  • Publishing Upper Half of RSA Decryption Exponent
  • PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples
  • A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model
  • An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme
  • Data and Web Security
  • Practical Universal Random Sampling
  • Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints
  • Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel
  • Validating Security Policy Conformance with WS-Security Requirements
  • Protocols
  • Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
  • Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
  • Group Signature Implies PKE with Non-interactive Opening and Threshold PKE
  • Network Security
  • A Generic Binary Analysis Method for Malware
  • A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs
  • Securing MANET Multicast Using DIPLOMA
  • Block Cipher
  • Preimage Attacks against Variants of Very Smooth Hash
  • Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification
  • Mutual Information Analysis under the View of Higher-Order Statistics
  • Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter
  • Implementation and Real Life Security
  • Differential Addition in Generalized Edwards Coordinates
  • Efficient Implementation of Pairing on BREW Mobile Phones
  • Introducing Mitigation Use Cases to Enhance the Scope of Test Cases
  • Optimal Adversary Behavior for the Serial Model of Financial Attack Trees.